Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp1134434rwb; Thu, 18 Aug 2022 20:13:30 -0700 (PDT) X-Google-Smtp-Source: AA6agR6ehVbsa/kelC2dPdte0V/Qs/7UK2QfR05m93IbmXi5v2fr47fRQwiZzUXHfalOWVSq0mDt X-Received: by 2002:aa7:8481:0:b0:535:f324:e26f with SMTP id u1-20020aa78481000000b00535f324e26fmr3487041pfn.45.1660878810252; Thu, 18 Aug 2022 20:13:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660878810; cv=none; d=google.com; s=arc-20160816; b=Y1WKIas50j4YDMgg5OQyV96SDoY8Ag+soL45D7bfGegS6S4AgJIClPmzkIuXefWK6t PJTlv2+tlq81e7eQNsVBco1gPgpBS++Gj/YwA8YIp6lMfmgasBM3QyTpMeQTn199F2UV dM1NPqoPHzxkwGGdwgkdFm195bD25oe/ILBevcyc/sgXRQYEttjm4hSWSsRQDKrgHrCX ko7y9Cgqn4abjtuESITR4lp6bnKVXo1xoVKITGSS0NDxGdB6iOd0/AiSnW7hOyJIWZCt 9PtNkhDQ9MznOWVg1FtHcZP9eg1OX7w5W3/j/x+P5adVbD6qX8H8D4b2icuzawekNZDh mH6g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=emcN7vG1gSKdDUnJmL1tlqbh0BezZjNO94SdekoZC1s=; b=AZ5J1BfmG/nQAhXo4Oc8wIs62gpNUDXMSBORRVr23Hc4+79/XLhbmbrWxp2xXcFz0t /c9s/b3/51fifYJS8LCZ7qrTQ+YAxbzjX6KhqaX2grODcPBGkhxaRPv5BXvlA1iL7hzc LCTM+8FI/MaOXspjyR0y5EC9AwOIGKl3csSKmjS+KnHoQxJ8rBQbRU/WlscGyTFmp/Aw Bcl2QYsh/TsjacI5L1mPaQVkapbaqo/XoSj7X3Ll1DOa3oYNV6uYcPNH68UN6DPqEKQ/ ARXjSfv/Sji13c7vZU0imocIJlILQrXIaHmBjLXO0gmpnzy4Jf5sJVk+t1t9ROvAfWMB vR5w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="b/KIBp6h"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v1-20020a17090a0c8100b001fac686bd44si2913059pja.37.2022.08.18.20.13.19; Thu, 18 Aug 2022 20:13:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="b/KIBp6h"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345147AbiHSCzS (ORCPT + 99 others); Thu, 18 Aug 2022 22:55:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33900 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344900AbiHSCzN (ORCPT ); Thu, 18 Aug 2022 22:55:13 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0C85BD39B4; Thu, 18 Aug 2022 19:55:13 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 9F59B6149F; Fri, 19 Aug 2022 02:55:12 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D25A2C433C1; Fri, 19 Aug 2022 02:55:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1660877712; bh=+m/z9t7difm+T7Kf5VxuNeNPtaHK+1MlGIRm7crGn/M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=b/KIBp6hGb/CV7ctjyoNlVNQctbDKqvWvOycBri2jc8hs9jUBTknd3RUQZctSwBLL yxSkFw0wSgftsks4Jezn7Vkx/H3bXALoSoIeBckdBjW9MMbGpWsWOjeRdf7u3z5SIU i6JkQUV3k0hBw1x10fSsb1DSNVGOVd6XnafE0lln8m68gdOiySWihoy1hal61YTPhL JVx1X0kgAnAr3Q3mh1rJwygcyxhoEyqMe//CRj+Au8ixgPCs3/lUYs5fY4Aaj3qp6R Y2aOOyquD6emEJypZunLgSQEEWmPr8Rt85PLL1Hrtdg4QeqLhKpPq/SjH/8sWci13v zeg/00VCA9i0Q== From: guoren@kernel.org To: xianting.tian@linux.alibaba.com, palmer@dabbelt.com, heiko@sntech.de, guoren@kernel.org, conor.dooley@microchip.com Cc: linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, liaochang1@huawei.com, mick@ics.forth.gr, jszhang@kernel.org, Guo Ren , Arnd Bergmann , Will Deacon , Catalin Marinas , x86@kernel.org Subject: [PATCH V3 3/3] arch: crash: Remove duplicate declaration in smp.h Date: Thu, 18 Aug 2022 22:54:44 -0400 Message-Id: <20220819025444.2121315-4-guoren@kernel.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220819025444.2121315-1-guoren@kernel.org> References: <20220819025444.2121315-1-guoren@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Guo Ren Remove crash_smp_send_stop declarations in arm64, x86 asm/smp.h which has been done in include/linux/smp.h. Signed-off-by: Guo Ren Signed-off-by: Guo Ren Cc: Arnd Bergmann Cc: Will Deacon Cc: Catalin Marinas Cc: x86@kernel.org --- arch/arm64/include/asm/smp.h | 1 - arch/x86/include/asm/crash.h | 1 - 2 files changed, 2 deletions(-) diff --git a/arch/arm64/include/asm/smp.h b/arch/arm64/include/asm/smp.h index fc55f5a57a06..a108ac93fd8f 100644 --- a/arch/arm64/include/asm/smp.h +++ b/arch/arm64/include/asm/smp.h @@ -141,7 +141,6 @@ static inline void cpu_panic_kernel(void) */ bool cpus_are_stuck_in_kernel(void); -extern void crash_smp_send_stop(void); extern bool smp_crash_stop_failed(void); extern void panic_smp_self_stop(void); diff --git a/arch/x86/include/asm/crash.h b/arch/x86/include/asm/crash.h index 8b6bd63530dc..6a9be4907c82 100644 --- a/arch/x86/include/asm/crash.h +++ b/arch/x86/include/asm/crash.h @@ -7,6 +7,5 @@ struct kimage; int crash_load_segments(struct kimage *image); int crash_setup_memmap_entries(struct kimage *image, struct boot_params *params); -void crash_smp_send_stop(void); #endif /* _ASM_X86_CRASH_H */ -- 2.36.1